spam identity theft compliance resilience Proofpoint risk assessment BEC EDR confidentiality OS botnet Defense- in-depth ransomware worm PHI DDoS VPN cyber attack incident response IOC integrity incident defense evasion zero- day Security Operations passphrase encryption phishing admin APT business continuity PII firewall SyssecAdmin exploit risk malware breach training IP escalation Cyber Defense Dark Web IPS spoofing hacker security policy password bug spyware smishing WISP HIPAA FTP Cyber Security MFA network vishing packet availability IDS IoT social engineering rootkit virus vulnerability cryptography antivirus insider threat CIA triad security awareness pentest spam identity theft compliance resilience Proofpoint risk assessment BEC EDR confidentiality OS botnet Defense- in-depth ransomware worm PHI DDoS VPN cyber attack incident response IOC integrity incident defense evasion zero- day Security Operations passphrase encryption phishing admin APT business continuity PII firewall SyssecAdmin exploit risk malware breach training IP escalation Cyber Defense Dark Web IPS spoofing hacker security policy password bug spyware smishing WISP HIPAA FTP Cyber Security MFA network vishing packet availability IDS IoT social engineering rootkit virus vulnerability cryptography antivirus insider threat CIA triad security awareness pentest
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
spam
identity theft
compliance
resilience
Proofpoint
risk assessment
BEC
EDR
confidentiality
OS
botnet
Defense-in-depth
ransomware
worm
PHI
DDoS
VPN
cyber attack
incident response
IOC
integrity
incident
defense evasion
zero-day
Security Operations
passphrase
encryption
phishing
admin
APT
business continuity
PII
firewall
SyssecAdmin
exploit
risk
malware
breach
training
IP
escalation
Cyber Defense
Dark Web
IPS
spoofing
hacker
security policy
password
bug
spyware
smishing
WISP
HIPAA
FTP
Cyber Security
MFA
network
vishing
packet
availability
IDS
IoT
social engineering
rootkit
virus
vulnerability
cryptography
antivirus
insider threat
CIA triad
security awareness
pentest